Proceedings:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | Undetermined |
Veröffentlicht: |
Los Alamitos, Calif. u.a.
IEEE Computer Society Press
1991
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | IX, 385 S. graph. Darst. |
ISBN: | 0818691689 0818621680 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV005425100 | ||
003 | DE-604 | ||
005 | 19930719 | ||
007 | t| | ||
008 | 920701s1991 xx d||| |||| 10||| und d | ||
020 | |a 0818691689 |9 0-8186-9168-9 | ||
020 | |a 0818621680 |9 0-8186-2168-0 | ||
035 | |a (OCoLC)632015334 | ||
035 | |a (DE-599)BVBBV005425100 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | |a und | ||
049 | |a DE-91 |a DE-91G |a DE-739 |a DE-83 |a DE-188 | ||
084 | |a DAT 450f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
111 | 2 | |a Symposium on Research in Security and Privacy |n 12 |d 1991 |c Oakland, Calif. |j Verfasser |0 (DE-588)5073781-8 |4 aut | |
245 | 1 | 0 | |a Proceedings |c 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20 - 22, 1991, Oakland, Calif. |
246 | 1 | 3 | |a Research in security and privacy |
264 | 1 | |a Los Alamitos, Calif. u.a. |b IEEE Computer Society Press |c 1991 | |
300 | |a IX, 385 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmiersprache |0 (DE-588)4047409-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 1991 |z Oakland Calif. |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Programmiersprache |0 (DE-588)4047409-4 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
710 | 2 | |a IEEE Computer Society |e Sonstige |0 (DE-588)25694-8 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003392296&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-003392296 |
Datensatz im Suchindex
_version_ | 1820868094117019648 |
---|---|
adam_text |
Table of Contents
Message from the Program Chair
.
v
Conference Committee
. .vi
Covert Channels I
D.Kemmerer
An Analysis of Covert Timing Channels
.2
J.C. Wray
Reducing Timing Channels with Fuzzy Time
.
S
W.-M.Hu
Toward a Mathematical Foundation for Information Plow Security
.21
J.W. Gray, III
Covert
Chañéis
Π
Chair: P.Neumann
Covert Flow Trees: A Technique for Identifying and
Analyzing Covert Storage Channels
.36
PA.
Porras andRA.
Kemmerer
Storage Channels in Disk Ann Optimization
.52
PA,
Karger
and
J.C. Wray
Models
Chair: J.Jacob
Modeling Nondisclosure in Terms of the Subject-Instruction Stream
.64
J.G. Williams
A Separation Model for Virtual Machine Monitors
.78
NL.
Kelem
and
RJ.
Feiertag
Safety Analysts for the Extended Schematic Protection Model.
.
Ю
PA. Ammann aitdRJS. Sandfat
A Taxonomy for Information How Policies and Models.
.98
SM.Foley
Distributed Systems
Chair: S. JUpner
Intrusion Tolerance in Distributed Computing Systems
. . .110
Y.
Demone,
L.
BkuntOndJ.-C. Fabre
Verification of Secure Distributed Systems in Higher Older Logic:
A Modular Approach Using Generic Components
. .122
/.
Alves-Foss and K. Levitt
Applying a Theory of
Modules
and Inter&ces to Security Verification.
. ,136
$£.
Lam, A.U. Sfumkar, and
T.Y.C.
Woo
¥11
Protocol
Verification
Chair: J. McLean
The Use of Logic in the Analysis of Cryptographic Protocols
.156
P. Syverson
Exploring the BAN Approach to Protocol Analysis
.171
E. Snekkenes
A System for the Specification and Verification of
Key Management Protocols
.182
C. Meadows
Policy
Chair: E. Boebert
Toward an Approach to Measuring Software Trust
.198
E. Amoroso, T. Nguyen, J. Weiss, J. Watson,
P. Lapiska, and T. Starr
On the Buzzword "Security Policy"
.219
D.F. Sterne
Authentication
Chair:
С
Meadows
SPX: Global Authentication Using Public Key Certificates
.232
JJ.
Tardo
and K. Alagappan
Protecting Security Information in Distributed Systems
.245
С
Fritzner,
L.
Nilsen, and
k. Skomedal
An Analysis of the Proxy Problem in Distributed Systems
.255
V. Varadharajan, P.
Aüen,
and S. Black
Database Security
Chair:
С
Garvey
Microdata
Disclosure Limitation in Statistical Databases:
Query Size and Random Sample Query Control
.278
G.T. Duncan and S. Mukkerjee
Discretionary Access Controls in a High-Performance
Object Management System
.288
U.
Kelter
A Novel Decomposition of Multilevel Relations into
Single-Level Relations
.300
S. Jajodia and R. Sandhu
Intrusion Detection
Chair: T.Lunt
The SRI IDES Statistical Anomaly Detector
.316
AS. Javitz and A. VaMes
VIII
A Pattem-Oriented Intrusion-Detection Model and Its Applications
.327
S.W.
Shieh and VD. GUgor
Directed-Graph Epidemiological Models of Computer
Virases
.343
J.
O. Kephart
and
ЅЛ.
White
Information Theory
Chair: J.Millen
Variable Noise Effects Upon a Simple Timing Channel
.362
LŠ.
Moskowitz
The Turing Test and Non-Information Flow
.373
R. Brown
PANEL: Information Theory in Computer Security
G. Eizenberg
Author Index
.389 |
any_adam_object | 1 |
author_corporate | Symposium on Research in Security and Privacy Oakland, Calif |
author_corporate_role | aut |
author_facet | Symposium on Research in Security and Privacy Oakland, Calif |
author_sort | Symposium on Research in Security and Privacy Oakland, Calif |
building | Verbundindex |
bvnumber | BV005425100 |
classification_rvk | SS 1991 |
classification_tum | DAT 450f DAT 460f DAT 050f |
ctrlnum | (OCoLC)632015334 (DE-599)BVBBV005425100 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV005425100</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19930719</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">920701s1991 xx d||| |||| 10||| und d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0818691689</subfield><subfield code="9">0-8186-9168-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0818621680</subfield><subfield code="9">0-8186-2168-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)632015334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV005425100</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">und</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 450f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Symposium on Research in Security and Privacy</subfield><subfield code="n">12</subfield><subfield code="d">1991</subfield><subfield code="c">Oakland, Calif.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)5073781-8</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings</subfield><subfield code="c">1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20 - 22, 1991, Oakland, Calif.</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Research in security and privacy</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Los Alamitos, Calif. u.a.</subfield><subfield code="b">IEEE Computer Society Press</subfield><subfield code="c">1991</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 385 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmiersprache</subfield><subfield code="0">(DE-588)4047409-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1991</subfield><subfield code="z">Oakland Calif.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Programmiersprache</subfield><subfield code="0">(DE-588)4047409-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IEEE Computer Society</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)25694-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003392296&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-003392296</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 1991 Oakland Calif. gnd-content |
genre_facet | Konferenzschrift 1991 Oakland Calif. |
id | DE-604.BV005425100 |
illustrated | Illustrated |
indexdate | 2025-01-10T13:18:53Z |
institution | BVB |
institution_GND | (DE-588)5073781-8 (DE-588)25694-8 |
isbn | 0818691689 0818621680 |
language | Undetermined |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-003392296 |
oclc_num | 632015334 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-91G DE-BY-TUM DE-739 DE-83 DE-188 |
owner_facet | DE-91 DE-BY-TUM DE-91G DE-BY-TUM DE-739 DE-83 DE-188 |
physical | IX, 385 S. graph. Darst. |
publishDate | 1991 |
publishDateSearch | 1991 |
publishDateSort | 1991 |
publisher | IEEE Computer Society Press |
record_format | marc |
spelling | Symposium on Research in Security and Privacy 12 1991 Oakland, Calif. Verfasser (DE-588)5073781-8 aut Proceedings 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20 - 22, 1991, Oakland, Calif. Research in security and privacy Los Alamitos, Calif. u.a. IEEE Computer Society Press 1991 IX, 385 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Programmiersprache (DE-588)4047409-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 1991 Oakland Calif. gnd-content Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s 1\p DE-604 Programmiersprache (DE-588)4047409-4 s 2\p DE-604 IEEE Computer Society Sonstige (DE-588)25694-8 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003392296&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Proceedings Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Programmiersprache (DE-588)4047409-4 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4011144-1 (DE-588)4047409-4 (DE-588)1071861417 |
title | Proceedings |
title_alt | Research in security and privacy |
title_auth | Proceedings |
title_exact_search | Proceedings |
title_full | Proceedings 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20 - 22, 1991, Oakland, Calif. |
title_fullStr | Proceedings 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20 - 22, 1991, Oakland, Calif. |
title_full_unstemmed | Proceedings 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20 - 22, 1991, Oakland, Calif. |
title_short | Proceedings |
title_sort | proceedings |
topic | Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Programmiersprache (DE-588)4047409-4 gnd |
topic_facet | Datenschutz Datensicherung Programmiersprache Konferenzschrift 1991 Oakland Calif. |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=003392296&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT symposiumonresearchinsecurityandprivacyoaklandcalif proceedings AT ieeecomputersociety proceedings AT symposiumonresearchinsecurityandprivacyoaklandcalif researchinsecurityandprivacy AT ieeecomputersociety researchinsecurityandprivacy |